-
1
-
-
67649170977
-
Hybrid reasoning in the care middleware for context awareness
-
Agostini A, Bettini C, Riboni D (2009) Hybrid reasoning in the care middleware for context awareness. Int J Web Eng Technol 5(1):3-23
-
(2009)
Int J Web Eng Technol
, vol.5
, Issue.1
, pp. 3-23
-
-
Agostini, A.1
Bettini, C.2
Riboni, D.3
-
2
-
-
78651075297
-
Capturing provenance in the wild
-
In:. Lecture notes in computer science, Springer
-
Allen MD, Chapman A, Blaustein BT, Seligman L (2010) Capturing provenance in the wild. In: Proceedings of provenance and annotation of data and processes. Lecture notes in computer science, vol 6378. Springer, pp 98-101
-
(2010)
Proceedings of Provenance and Annotation of Data and Processes
, vol.6378
, pp. 98-101
-
-
Allen, M.D.1
Chapman, A.2
Blaustein, B.T.3
Seligman, L.4
-
3
-
-
39149137189
-
Databases with uncertainty and lineage
-
Benjelloun O, Sarma AD, Halevy AY, Theobald M, Widom J (2008) Databases with uncertainty and lineage. VLDB J 17(2): 243-264
-
(2008)
Vldb J
, vol.17
, Issue.2
, pp. 243-264
-
-
Benjelloun, O.1
Sarma, A.D.2
Halevy, A.Y.3
Theobald, M.4
Widom, J.5
-
4
-
-
51649098970
-
Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications
-
Bettini C, Pareschi L, Riboni D (2008) Efficient profile aggregation and policy evaluation in a middleware for adaptive mobile applications. Pervasive Mobile Comput 4(5):697-718
-
(2008)
Pervasive Mobile Comput
, vol.4
, Issue.5
, pp. 697-718
-
-
Bettini, C.1
Pareschi, L.2
Riboni, D.3
-
5
-
-
77950189737
-
A survey of context modelling and reasoning techniques
-
Bettini C, Brdiczka O, Henricksen K, Indulska J, Nicklas D, Ranganathan A, Riboni D (2010) A survey of context modelling and reasoning techniques. Pervasive Mobile Comput 6(2):161-180
-
(2010)
Pervasive Mobile Comput
, vol.6
, Issue.2
, pp. 161-180
-
-
Bettini, C.1
Brdiczka, O.2
Henricksen, K.3
Indulska, J.4
Nicklas, D.5
Ranganathan, A.6
Riboni, D.7
-
6
-
-
71649100806
-
On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled wireless sensor networks
-
Boyle DE, Newe T (2009) On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled wireless sensor networks. Sens Actuat A Phys 156(2):394-405
-
(2009)
Sens Actuat A Phys
, vol.156
, Issue.2
, pp. 394-405
-
-
Boyle, D.1
Newe, T.2
-
11
-
-
0038546767
-
Lineage tracing for general data warehouse transformations
-
Cui Y, Widom J (2003) Lineage tracing for general data warehouse transformations. VLDB J 12(1):41-58
-
(2003)
Vldb J
, vol.12
, Issue.1
, pp. 41-58
-
-
Cui, Y.1
Widom, J.2
-
12
-
-
84900830868
-
Understanding and using context
-
Dey AK (2001) Understanding and using context. Pers Ubiquit Comput 5(1):4-7
-
(2001)
Pers Ubiquit Comput
, vol.5
, Issue.1
, pp. 4-7
-
-
Dey, A.K.1
-
14
-
-
56049103039
-
OWL 2: The next step for OWL
-
Grau BC, Horrocks I, Motik B, Parsia B, Patel-Schneider PF, Sattler U (2008) OWL 2: the next step for OWL. J Web Semant 6(4):309-322
-
(2008)
J Web Semant
, vol.6
, Issue.4
, pp. 309-322
-
-
Grau, B.C.1
Horrocks, I.2
Motik, B.3
Parsia, B.4
Patel-Schneider, P.F.5
Sattler, U.6
-
15
-
-
78651091858
-
Publishing and consuming provenance metadata on the web of linked data
-
In Proceedings of IPAW 2010., Springer
-
Hartig O, Zhao J (2010) Publishing and consuming provenance metadata on the web of linked data. In Proceedings of IPAW 2010. Lecture notes in computer science, vol 6378. Springer, pp 78-90
-
(2010)
Lecture Notes in Computer Science
, vol.6378
, pp. 78-90
-
-
Hartig, O.1
Zhao, J.2
-
17
-
-
57149123932
-
Efficient lineage tracking for scientific workflows
-
ACM
-
Heinis T, Alonso G (2008) Efficient lineage tracking for scientific workflows. In Proceedings of ACMSIGMOD.ACM, pp 1007-1018
-
(2008)
Proceedings of ACMSIGMOD
, pp. 1007-1018
-
-
Heinis, T.1
Alonso, G.2
-
18
-
-
4344615591
-
From SHIQ and RDF to OWL: The making of a web ontology language
-
ISSN1570-8268
-
Horrocks I, Patel-Schneider PF, van Harmelen F (2003) From SHIQ and RDF to OWL: the making of a web ontology language. J Web Semant 1(1):7-26. ISSN 1570-8268
-
(2003)
J Web Semant
, vol.1
, Issue.1
, pp. 7-26
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Van Harmelen, F.3
-
19
-
-
18744404327
-
-
W3c member submission, W3C, May 2004. URL
-
Horrocks I, Patel-Schneider PF, Boley H, Tabet S, Grosof B, Dean M (2004) SWRL: a semantic web rule language combining OWL and RuleML. W3c member submission, W3C, May 2004. URL http://www.w3.org/Submission/2004/SUBM-SWRL- 20040521/
-
(2004)
SWRL: A Semantic Web Rule Language Combining OWL and RuleML
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
-
21
-
-
0013178157
-
Data elements and interchange formats-information interchange- representation of dates and times
-
International Organization for Standardization, 8601 I., ISO, Geneva, Switzerland, 2004. URL
-
International Organization for Standardization: ISO 8601 (2004) Data elements and interchange formats-information interchange- representation of dates and times. Technical report, ISO, Geneva, Switzerland, 2004. URL http://www.iso.ch/cate/d40874. html
-
(2004)
Technical Report
-
-
-
24
-
-
63749121143
-
Design of architectures for proximity-aware services: Experiments in context-based authentication with subjective logic
-
Lenzini G (2009) Design of architectures for proximity-aware services: experiments in context-based authentication with subjective logic. Electron Notes Theor Comput Sci 236:47-64
-
(2009)
Electron Notes Theor Comput Sci
, vol.236
, pp. 47-64
-
-
Lenzini, G.1
-
25
-
-
84880762436
-
A hybrid discriminative/generative approach for modeling human activities
-
In: Leslie PK, Alessandro S (eds). Professional Book Center
-
Lester J, Choudhury T, Kern, Nicky B, Gaetan HB (2005) A hybrid discriminative/generative approach for modeling human activities. In: Leslie PK, Alessandro S (eds) IJCAI-05, proceedings of the nineteenth international joint conference on artificial intelligence. Professional Book Center, pp 766-772
-
(2005)
IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence
, pp. 766-772
-
-
Lester, J.1
Choudhury, T.2
Kern3
Nicky, B.4
Gaetan, H.B.5
-
26
-
-
33847663341
-
A tableau algorithm for description logics with concrete domains and general tboxes
-
Lutz C, Milicic M (2007) A tableau algorithm for description logics with concrete domains and general tboxes. J Autom Reason 38(1-3):227-259
-
(2007)
J Autom Reason
, vol.38
, Issue.1-3
, pp. 227-259
-
-
Lutz, C.1
Milicic, M.2
-
28
-
-
44949112232
-
Recognizing and predicting context by learning from user behavior
-
In Schreiner W, Kotsis G, Ferscha A, Ibrahim K (eds). Austrian Computer Society (OCG)
-
Mayrhofer R, Radi H, Ferscha A (2003) Recognizing and predicting context by learning from user behavior. In Schreiner W, Kotsis G, Ferscha A, Ibrahim K (eds) Proceedings of MoMM 2003: 1st international conference on advances in mobile multimedia. vol 171. Austrian Computer Society (OCG), pp 25-35
-
(2003)
Proceedings of MoMM 2003: 1st International Conference on Advances in Mobile Multimedia
, vol.171
, pp. 25-35
-
-
Mayrhofer, R.1
Radi, H.2
Ferscha, A.3
-
29
-
-
51849084698
-
Pml 2: A modular explanation interlingua
-
vol WS-07-06 of AAAI technical report. AAAI Press
-
McGuinness DL, Ding LI, da Silva, PP, Chang C (2007) Pml 2: a modular explanation interlingua. In: Proceedings of the 2007 AAAI workshop on explanation-aware computing, vol WS-07-06 of AAAI technical report. AAAI Press, pp 49-55.
-
(2007)
Proceedings of the 2007 AAAI Workshop on Explanation-aware Computing
, pp. 49-55
-
-
McGuinness, D.L.1
Ding, L.I.2
Da Silva, P.P.3
Chang, C.4
-
30
-
-
78650064937
-
The foundations for provenance on the web
-
Moreau Luc (2010) The foundations for provenance on the web. Found Trends Web Sci 2(2-3):99-241
-
(2010)
Found Trends Web Sci
, vol.2
, Issue.2-3
, pp. 99-241
-
-
Luc, M.1
-
31
-
-
79953210348
-
The open provenance model core specification (v1.1)
-
Moreau L, Clifford B, Freire J, Futrelle J, Gil Y, Groth PT, Kwasnikowska N, Miles S, Missier P, Myers J, Plale B, Simmhan Y, Stephan EG, Vanden BJ(2011) The open provenance model core specification (v1.1). Future Gener Compt Syst 27(6):743-756
-
(2011)
Future Gener Compt Syst
, vol.27
, Issue.6
, pp. 743-756
-
-
Moreau, L.1
Clifford, B.2
Freire, J.3
Futrelle, J.4
Gil, Y.5
Groth, P.T.6
Kwasnikowska, N.7
Miles, S.8
Missier, P.9
Myers, J.10
Plale, B.11
Simmhan, Y.12
Stephan, E.G.13
Vanden, B.J.14
-
33
-
-
35048875905
-
Middlewhere: A middleware for location awareness in ubiquitous computing applications
-
In Proceedings of Middleware 2004., Springer
-
Ranganathan A, Al-Muhtadi J, Chetan S, Campbell RH, Mickunas MD (2004) Middlewhere: a middleware for location awareness in ubiquitous computing applications. In Proceedings of Middleware 2004. Lecture notes in computer science, vol 3231. Springer, pp 397-416
-
(2004)
Lecture Notes in Computer Science
, vol.3231
, pp. 397-416
-
-
Ranganathan, A.1
Al-Muhtadi, J.2
Chetan, S.3
Campbell, R.H.4
Mickunas, M.D.5
-
34
-
-
79958226915
-
COSAR: Hybrid reasoning for context-aware activity recognition
-
Riboni D, Bettini C (2011) COSAR: hybrid reasoning for context-aware activity recognition. Person Ubiquit Comput 7(3):379-395
-
(2011)
Person Ubiquit Comput
, vol.7
, Issue.3
, pp. 379-395
-
-
Riboni, D.1
Bettini, C.2
-
35
-
-
70349152687
-
Privacy in georeferenced context-aware services: A survey. in Privacy in location-based applications
-
Springer
-
Riboni D, Pareschi L, Bettini C (2009) Privacy in georeferenced context-aware services: a survey. In Privacy in location-based applications. Lecture notes in computer science, vol 5599. Springer, pp 151-172
-
(2009)
Lecture Notes in Computer Science
, vol.5599
, pp. 151-172
-
-
Riboni, D.1
Pareschi, L.2
Bettini, C.3
-
37
-
-
52649122656
-
Exploiting lineage for confidence computation in uncertain and probabilistic databases
-
IEEE Comput Soc
-
Sarma AD, Theobald M, Widom J (2008) Exploiting lineage for confidence computation in uncertain and probabilistic databases. In Proceedings of ICDE 2008. IEEE Comput Soc, pp 1023-1032
-
(2008)
Proceedings of ICDE 2008
, pp. 1023-1032
-
-
Sarma, A.D.1
Theobald, M.2
Widom, J.3
-
38
-
-
50949127576
-
Quality-of-context and its use for protecting privacy in context aware systems
-
Sheikh K, Wegdam M, van Sinderen M (2008) Quality-of-context and its use for protecting privacy in context aware systems. J Softw 3(3):83-93
-
(2008)
J Softw
, vol.3
, Issue.3
, pp. 83-93
-
-
Sheikh, K.1
Wegdam, M.2
Van Sinderen, M.3
-
39
-
-
31444456909
-
A survey of data provenance in e-science
-
Simmhan Y, Plale B, Gannon D (2005) A survey of data provenance in e-science. SIGMOD Rec 34(3):31-36
-
(2005)
SIGMOD Rec
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.1
Plale, B.2
Gannon, D.3
-
40
-
-
42449141856
-
Karma2: Provenance management for data-driven workflows
-
Simmhan YL, Plale B, Gannon D (2008) Karma2: provenance management for data-driven workflows. Int J Web Serv Res 5(2):1-22
-
(2008)
Int J Web Serv Res
, vol.5
, Issue.2
, pp. 1-22
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
41
-
-
13944269967
-
Clock synchronization for wireless sensor networks: A survey
-
Sundararaman B, Buy U, Kshemkalyani AD (2005) Clock synchronization for wireless sensor networks: a survey. Ad Hoc Netw 3(3):281-323
-
(2005)
Ad Hoc Netw
, vol.3
, Issue.3
, pp. 281-323
-
-
Sundararaman, B.1
Buy, U.2
Kshemkalyani, A.D.3
-
42
-
-
77950786930
-
Accurate activity recognition in a home setting
-
In: Proceedings of UbiComp 2008., ACM
-
van K, Tim N, Athanasios K, Englebienne G, Kröse BJA (2008) Accurate activity recognition in a home setting. In: Proceedings of UbiComp 2008. ACM international conference proceeding series, vol 344. ACM, pp 1-9
-
(2008)
ACM International Conference Proceeding Series
, vol.344
, pp. 1-9
-
-
Van, K.1
Tim, N.2
Athanasios, K.3
Englebienne, G.4
Bja, K.5
-
43
-
-
77954085269
-
Achieving robust message authentication in sensor networks: A public-key based approach
-
Wang H, Li Q (2010) Achieving robust message authentication in sensor networks: a public-key based approach. Wirel Netw 16(4):999-1009
-
(2010)
Wirel Netw
, vol.16
, Issue.4
, pp. 999-1009
-
-
Wang, H.1
Li, Q.2
-
44
-
-
77955233468
-
Obstacles on the way to qualitative spatial reasoning with description logics: Some undecidability results
-
In International description logics workshop (DL-2001)., vol CEUR-WS.org
-
Wessel M (2001) Obstacles on the way to qualitative spatial reasoning with description logics: some undecidability results. In International description logics workshop (DL-2001). CEUR workshop proceedings, vol CEUR-WS.org, pp 122-131
-
(2001)
CEUR Workshop Proceedings
, pp. 122-131
-
-
Wessel, M.1
-
45
-
-
18844422430
-
A data mining approach for location prediction in mobile environments
-
Yavas G, Katsaros D, Ulusoy Ö, Manolopoulos Y (2005) A data mining approach for location prediction in mobile environments. Data Knowl Eng 54(2):121-146
-
(2005)
Data Knowl Eng
, vol.54
, Issue.2
, pp. 121-146
-
-
Yavas, G.1
Katsaros, D.2
Ulusoy, O.3
Manolopoulos, Y.4
-
46
-
-
70349887668
-
Do you know where your data's been?-Tamper-evident database provenance
-
6th VLDB workshop. Lecture notes in computer science, Springer
-
Zhang J, Chapman A, LeFevre K (2009) Do you know where your data's been?-Tamper-evident database provenance. In Proceedings of secure data management, 6th VLDB workshop. Lecture notes in computer science, vol 5776. Springer, pp 17-32
-
(2009)
Proceedings of Secure Data Management
, vol.5776
, pp. 17-32
-
-
Zhang, J.1
Chapman, A.2
Lefevre, K.3
|